Connect to the AGA metrics schema as its owner and execute the following statements: grant select on AGENT_SKILL_GROUP_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on CALL_TYPE_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on CONTROLLER_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on INTERACTION_QUEUE_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on PERIPHERAL_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on QUEUE_SET1_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on QUEUE_SET2_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on SERVICE_MEMBER to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on SERVICE_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;grant select on SKILL_GROUP_REAL_TIME to <ADVISORS PLATFORM USER> WITH GRANT OPTION;

2. Test the connectivity by verifying that the following select statements return 0 or more rows if executed by Platform user-schema owner:

Use the information on this tab to configure connectivity to the Cisco ICM data source (ICM AWDB) when the Platform database is installed on an Oracle instance.

Before you begin:

Identify all ICM AWDBs that must be accessed by CCAdv and WA, as well as the SQL Servers that host those databases.

Ensure that SQL Server accounts exist on all SQL Servers that host the ICM AWDBs accessed by CCAdv and WA.

Ensure that each MSSQL Server account (see preceding bullet) has the MSSQL master database as a default database.

Ensure that each ICM AWDB that must be accessed by CCAdv and WA has a user mapped to the relevant SQL Server account (see preceding bullets). The minimum requirement is that this user has permissions to select the data from the following CISCO source AWDB views:

Agent_Skill_Group_Real_Time

Call_Type

Call_Type_Real_Time

Logical_Interface_Controller

Peripheral

Peripheral_Real_Time

Service

Service_Real_Time

Skill_Group

Skill_Group_Real_Time

Service_Member

and

AWDB Controller_Time table

Ensure the user has the preceding object-level permissions or this user is assigned to an equivalent user-defined database role. If it is allowed by your organization’s security policy, the user can be assigned to any database standard role that includes the above minimum permissions. As an example, the user can be assigned to the standard db_datareader role.

Ensure the Oracle Database Gateway for SQL Server is installed.

Ensure the Gateway Initialization parameter file(s) exists for each Cisco ICM data source used by CCAdv and WA.

Ensure the Oracle Net Listener configuration file has an entry for every gateway instance that exists for Cisco ICM data sources.

Ensure the Oracle database that hosts the Platform schema is configured for Gateway Access and its tnsnames.ora configuration file contains a separate entry for each gateway instance. The alias from each such entry is used as database link creation parameters.

For detailed information about SQL Server security configuration, see the online documentation for Microsoft SQL Server at http://msdn.microsoft.com.

1. Create – or have your DBA create – a separate database link for each ICM source using a corresponding gateway instance. The links can be created inside the Platform schema or they can be created as public database links.

Create database links using the following pattern:CREATE [PUBLIC] DATABASE LINK <arbitrary mssql database link name> CONNECT TO "<MSSQL username created for you in ICM awdb>" IDENTIFIED BY "<MSSQL password created for you in ICM awdb>" USING '<gateway_sid>';
where gateway_sid is the entry of the corresponding gateway instance contained in the tnsnames.ora file.
For example:CREATE PUBLIC DATABASE LINK "prod67543.icm1" CONNECT TO "user1" IDENTIFIED BY "password1" USING 'dg4msql2';

2. Test the links from SqlDeveloper or run a select statement against the whole set of views as Platform user.